|
|||
Rule General Information |
---|
Release Date: | 2020-03-16 | |
Rule Name: | Microsoft Windows SMBv3 Compression Remote Code Execution Vulnerability-2 (CVE-2020-0796) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Others | |
Reference: | http://packetstormsecurity.com/files/156731/CoronaBlue-SMBGhost-Microsoft-Windows-10-SMB-3.1.1-Proof-Of-Concept.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796 http://packetstormsecurity.com/files/156732/Microsoft-Windows-SMB-3.1.1-Remote-Code-Execution.html |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/CVE-2020-0796 |